Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Delete: The Virtue of Forgetting in the Digital Age, Author: Viktor Mayer-Schönberger
Title: What Is Six SIGMA? / Edition 1, Author: Peter S. Pande
Title: Things a Computer Scientist Rarely Talks About, Author: Donald E. Knuth
Title: Sketching User Experiences: The Workbook, Author: Saul Greenberg
Title: Federated Identity Primer, Author: Derrick Rountree
Title: Computer Security: 20 Things Every Employee Should Know / Edition 2, Author: Ben Rothke
Title: Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems, Author: Eoghan Casey BS
Title: Digital Cultures, Author: Milad Doueihi
Title: Information Feudalism: Who Owns the Knowledge Economy?, Author: Peter Drahos
Title: Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1, Author: DUP John Biggs
Title: IT-Projektmanagement kompakt / Edition 3, Author: Pascal Mangold
Title: Computer Resources for People with Disabilities: A Guide to Assistive Technologies, Tools and Resources for People of All Ages / Edition 4, Author: Alliance for Technology Access
Title: Mathematical Theory of Advanced Computing, Author: Wolfgang W. Osterhage
Title: The Language of ICT: Information and Communication Technology / Edition 1, Author: Tim Shortis
Title: Beyond Calculation: The Next Fifty Years of Computing / Edition 1, Author: Peter J. Denning
Title: Credible Checklists and Quality Questionnaires: A User-Centered Design Method, Author: Chauncey Wilson
Title: User Interface Inspection Methods: A User-Centered Design Method, Author: Chauncey Wilson
Title: Geomedia: Networked Cities and the Future of Public Space / Edition 1, Author: Scott McQuire

Pagination Links